City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 214.12.100.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31708
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;214.12.100.19. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025012102 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 11:19:39 CST 2025
;; MSG SIZE rcvd: 106
Host 19.100.12.214.in-addr.arpa not found: 2(SERVFAIL)
server can't find 214.12.100.19.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 113.186.117.74 | attackbots | Unauthorized connection attempt from IP address 113.186.117.74 on Port 445(SMB) |
2020-01-22 05:55:00 |
| 190.47.71.41 | attackspam | Unauthorized connection attempt detected from IP address 190.47.71.41 to port 2220 [J] |
2020-01-22 05:47:24 |
| 18.191.159.191 | attackbots | Jan 21 21:54:58 OPSO sshd\[6505\]: Invalid user ram from 18.191.159.191 port 37218 Jan 21 21:54:58 OPSO sshd\[6505\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=18.191.159.191 Jan 21 21:55:01 OPSO sshd\[6505\]: Failed password for invalid user ram from 18.191.159.191 port 37218 ssh2 Jan 21 22:02:39 OPSO sshd\[8021\]: Invalid user user from 18.191.159.191 port 34990 Jan 21 22:02:39 OPSO sshd\[8021\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=18.191.159.191 |
2020-01-22 05:49:17 |
| 152.231.108.253 | attack | Jan 21 21:51:40 saengerschafter sshd[28244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.231.108.253 user=r.r Jan 21 21:51:42 saengerschafter sshd[28244]: Failed password for r.r from 152.231.108.253 port 51181 ssh2 Jan 21 21:51:50 saengerschafter sshd[28244]: message repeated 4 serveres: [ Failed password for r.r from 152.231.108.253 port 51181 ssh2] Jan 21 21:51:52 saengerschafter sshd[28244]: Failed password for r.r from 152.231.108.253 port 51181 ssh2 Jan 21 21:51:52 saengerschafter sshd[28244]: error: maximum authentication attempts exceeded for r.r from 152.231.108.253 port 51181 ssh2 [preauth] Jan 21 21:51:52 saengerschafter sshd[28244]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.231.108.253 user=r.r Jan 21 21:51:58 saengerschafter sshd[28250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.231.108.253 user=r.r Jan 21 21:51:59 sa........ ------------------------------- |
2020-01-22 05:54:34 |
| 137.25.101.102 | attack | Jan 21 23:17:58 MainVPS sshd[9970]: Invalid user dick from 137.25.101.102 port 35124 Jan 21 23:17:58 MainVPS sshd[9970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.25.101.102 Jan 21 23:17:58 MainVPS sshd[9970]: Invalid user dick from 137.25.101.102 port 35124 Jan 21 23:18:00 MainVPS sshd[9970]: Failed password for invalid user dick from 137.25.101.102 port 35124 ssh2 Jan 21 23:21:01 MainVPS sshd[15816]: Invalid user nut from 137.25.101.102 port 37044 ... |
2020-01-22 06:24:49 |
| 79.137.77.131 | attackbots | Unauthorized connection attempt detected from IP address 79.137.77.131 to port 2220 [J] |
2020-01-22 06:03:45 |
| 103.129.47.118 | attackbots | 2020-01-21 21:36:23 H=server5.mailguarantee.com [103.129.47.118]:35242 I=[10.100.18.25]:25 F= |
2020-01-22 05:59:18 |
| 218.155.242.177 | attackspambots | Jan 21 23:20:55 odroid64 sshd\[564\]: Invalid user ubuntu from 218.155.242.177 Jan 21 23:20:55 odroid64 sshd\[564\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.155.242.177 ... |
2020-01-22 06:28:18 |
| 209.17.97.66 | attack | Automatic report - Banned IP Access |
2020-01-22 06:21:17 |
| 103.56.76.170 | attackbotsspam | Unauthorized connection attempt from IP address 103.56.76.170 on Port 445(SMB) |
2020-01-22 05:55:13 |
| 181.211.244.253 | attack | Unauthorized connection attempt from IP address 181.211.244.253 on Port 445(SMB) |
2020-01-22 06:05:35 |
| 59.127.172.234 | attackbots | 2020-01-21T22:08:36.913064shield sshd\[4681\]: Invalid user schaal from 59.127.172.234 port 39574 2020-01-21T22:08:36.916692shield sshd\[4681\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59-127-172-234.hinet-ip.hinet.net 2020-01-21T22:08:39.152535shield sshd\[4681\]: Failed password for invalid user schaal from 59.127.172.234 port 39574 ssh2 2020-01-21T22:12:07.532610shield sshd\[5589\]: Invalid user ali from 59.127.172.234 port 41034 2020-01-21T22:12:07.537247shield sshd\[5589\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59-127-172-234.hinet-ip.hinet.net |
2020-01-22 06:20:10 |
| 106.12.36.42 | attackspam | SSH bruteforce (Triggered fail2ban) |
2020-01-22 06:22:15 |
| 46.38.144.57 | attack | Jan 21 23:19:28 relay postfix/smtpd\[7135\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jan 21 23:20:01 relay postfix/smtpd\[2178\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jan 21 23:20:13 relay postfix/smtpd\[8703\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jan 21 23:20:45 relay postfix/smtpd\[1141\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Jan 21 23:20:55 relay postfix/smtpd\[8872\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-01-22 06:26:14 |
| 143.255.58.55 | attackbotsspam | SIP/5060 Probe, BF, Hack - |
2020-01-22 06:21:48 |